Question

In: Computer Science

1) Describe what a VLAN is and how it might be important with wireless networks.     ...

1) Describe what a VLAN is and how it might be important with wireless networks.

    

2) Explain why packet filtering alone is inadequate as the only form of firewall.

    

3) Describe the role of a DMZ when talking about perimeter firewalls.

    

4) Describe what a “Proxy Server” is and how it is used with firewalls.

    

5) Explain the role of a “personal “ firewall on a corporate network where there is a robust perimeter firewall.

    

6) What is the advantage of a hardware firewall over a software-only firewall?

    

7) List three software firewalls that can be installed on a Windows PC.

    

8) List three firewall appliances that can be installed in a small business. Include the manufacturer and model number

    

9) Choose two Packet Filtering best practices from our text that you think are the most important. Explain why they are the most important.

    

Solutions

Expert Solution

Ans: VLAN or VirtualLocal Area Network is a network which is created by combining several LAN's together in a wireless and wired medium.VLAN basically overcome the physical lmitation of the LAN due to its virtual concept allowing organizations to increasesecurity measures and reduce network latency.

Setting VLAN with WLAN has advantages to prevent eavesdropping.The longet the keythe stringer is the ncryption because alonger key is more difficultto break.

Ans2: Packet filtering does not have the capability to block network attacks. Packet filtering filters packet based on the pIp address and the destined port number only but it does not filter the malicious data which may be present during that filter which can cause severe SQL Injection attack on web applications.

Ans3:DMZ or demilitarized Zone which is also known as Perimeter Network addas an extra layer of security to an organization's local area network.It is basically a separate netwoek usedfor placing web servers, email servers, and other servers to gain access from or to the Internet.It gives extra protection in mitigating risks before they reach the

Internal networks.

Ans 4:Proxy server is a passage between you and the Internet.,Basically Firewall Proxy server helps to conduct the sessions between the sender and receiver end and it makes a two party connection into a four oarty session. Itcentralizes all activity of the application into a single server.

Ans 5:Personal firewall are designed to run and protect a single worksation. Peronal firewall have more beter logging capabilities than those found on home networks.Itcontrols network trafficto and from a single computer.

It provides the feature of IP address sheilding which that makes a single computer less chance of being hacked

Ans 6:Hardware firewall is an appliance protecting all computers which isalso known a s gateway firewall.

          It is a piece of hardware which connects all your computers to the Internet. A hardware firewall unlike

         software firewall provides more security and runs on ots own processing power which indirectly lets your

         computer to perform better.

Ans 7:The Three Software firewalls that can be installed on the computer are as follows:

           1.Norton

           2. Comodofirewall

           3. Glasswire

Ans 8: The three firewall appliances thatcan be Installed on small business are as follows:

           1.Fortigate Next generations Company Name - Fortinet

           2.Cisco Meraki MX

          3. Sonic wall TZ

Ans 9 The Two best practices of Packet Filtering are as follows:

          1.Packet filtering is basically used where there is a modest security requirements where you don't need to

          be aware of your data being lost orfear of malicious SQL injections.

          2. A packet filtering is one of the very useful device which is used to isolate one subnet from the other

              which helps to filter packet from source toits specified destination only.


Related Solutions

1) What is a VLAN? Explain how frames are forwarded between devices in the same VLAN,...
1) What is a VLAN? Explain how frames are forwarded between devices in the same VLAN, and between different VLANs 2) Describe the IEEE 802.1Q protocol and how it affects the original Ethernet header. (please draw the IEEE 802.1Q header here to add to your explanation).
​how dow wireless networks affect the health care Industry
​how dow wireless networks affect the health care Industry
Why is security so important to wireless networks? Give two examples of defense measures that should...
Why is security so important to wireless networks? Give two examples of defense measures that should be taken to enhance wireless security.
1.What is the transmission medium for wireless networks? 2.What is the difference between half-duplex mode and...
1.What is the transmission medium for wireless networks? 2.What is the difference between half-duplex mode and full-duplex mode? 3.What are the main differences between a hub and a switch? What makes a switch a better choice? 4.Which device would you use to connect two network segments with different subnet addresses? 5. Which device connects hosts using different transmission media on the same subnet? 6.Which type of server handles user authentications? 7.What is the role of a DHCP server? 8. What...
What is the hidden-terminal problem as it relates to CSMA in wireless sensor networks?
What is the hidden-terminal problem as it relates to CSMA in wireless sensor networks?
What controls must be used to protect data that is transmitted across wireless networks?
What controls must be used to protect data that is transmitted across wireless networks?
what is your opinion on this? Should companies use wireless technology for their networks? The use...
what is your opinion on this? Should companies use wireless technology for their networks? The use of wireless technology would be useful as it can promote cost-efficient measures as wireless networks are less expensive due to fewer cables being used and it’s extremely flexible because workers can still do work while away from the office. However, there’s more of a risk of being exposed to attacks, and speeds may be significantly slower than a wired network. What limits should be...
What are two types of encryption for wireless networks? Which encryption standard is considered to be...
What are two types of encryption for wireless networks? Which encryption standard is considered to be more secure? Why? The property written in the format 00:00:00:0A:0B:0C for a device is called its ______________. Why should you disable the SSID on a wireless network? What is an evil twin attack? Why would you disable a Bluetooth device when you are in a public place? What happens when you jailbreak or root a device? What potential problems are caused by jailbreaking or...
What are Meltdown & Spectre? What are their security implication? What are the impacts of Meltdown & Spectre on the wireless networks?
What are Meltdown & Spectre? What are their security implication?What are the impacts of Meltdown & Spectre on the wireless networks?
1. Explain the factors that might lead to network intrusion through wireless connections. 2. Describe a...
1. Explain the factors that might lead to network intrusion through wireless connections. 2. Describe a cybersecurity attack or data breach that affected you personally.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT